- Denmark
- lron.github.io
Lists (9)
Sort Name ascending (A-Z)
Stars
OWASP Citizen Development Top 10
The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.
Vulnerability scanner written in Go which uses the data provided by https://osv.dev
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
A collection of common (interesting) cryptographic mistakes and learning resources.
Code signing and transparency for containers and binaries
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
A curated list of resources about post-quantum cryptography.
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
A minimalist Go API to scan Docker images for security vulnerabilities and weaknesses
Demonstrating the famous ECB penguin so that you can repeat the process yourself.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
🔐 Docker Container for Penetration Testing & Security
A curated list of awesome Zero-Knowledge Proofs (ZKP) resources.
A compilation of resources in the software supply chain security domain, with emphasis on open source
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
A Library of various cybersecurity resources
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.